Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and terminal for establishing security infrastructure and device

a technology of security infrastructure and terminal, applied in the field of payment security technology, can solve the problems of poor openness of the technical framework, and achieve the effect of improving openness

Active Publication Date: 2021-05-11
CHINA UNIONPAY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0004]Embodiments of the invention provides a method, terminal and device for establishing security infrastructure, so as to provide a technical framework with better openness.
[0011]A method for establishing security infrastructure provided by the above embodiments includes: an intermediate service organization receives an organization secret key sent by a third-party service organization; the intermediate service organization encrypts the organization secret key by a first encryption means, and sends the encrypted organization secret key to a secure storage region of a terminal, the first encryption means is to use a service private key of the intermediate service organization to sign the organization secret key and use a root public key of the terminal to encrypt the signed organization secret key; the intermediate service organization receives a first terminal public key encrypted by the terminal using a second encryption means, the second encryption means is to use a root private key of the terminal to sign the first terminal public key and use a service public key of the intermediate service organization to encrypt the signed first terminal public key; and the intermediate service organization sends the first terminal public key obtained by decryption to the third-party service organization. It can be seen that the organization secret key of the third-party service organization can be sent to the terminal through the intermediate service organization, and the first terminal public key of the terminal can be sent to the third-party service organization through the intermediate service organization. In this way, the intermediate service organization can not only ensure the security of the terminal and the third-party service organization and provide the common security infrastructure, but also provide the technical framework with better openness.

Problems solved by technology

The lack of service abstraction of service providers results in the poorer openness of the technical framework.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal for establishing security infrastructure and device
  • Method and terminal for establishing security infrastructure and device
  • Method and terminal for establishing security infrastructure and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059]In order to make the objects, technical solutions and beneficial effects of the invention clearer, the invention will further be illustrated below in details with reference to the drawings and the embodiments. It should be understood that the specific embodiments described herein are only used to explain the invention but not to limit the invention.

[0060]FIG. 1 exemplarily shows a flow chart of a method for establishing security infrastructure provided by an embodiment of the invention. As shown in FIG. 1, the method may include:

[0061]S101: an intermediate service organization receives an organization secret key sent by a third-party service organization.

[0062]S102: the intermediate service organization encrypts the organization secret key by a first encryption means, and sends the encrypted organization secret key to a secure storage region of a terminal.

[0063]Here, the first encryption means is to use a service private key of the intermediate service organization to sign the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method, terminal and device for establishing security infrastructure, comprising: an intermediate service organization receives an organization secret key sent by a third-party service organization; the intermediate service organization encrypts the organization secret key by a first encryption means and sends the encrypted organization secret key to a security storage region of a terminal; the intermediate service organization receives a first terminal public key encrypted by the terminal using a second encryption means; and the intermediate service organization sends the first terminal public key obtained by decryption to the third-party service organization. The organization secret key of the third-party service organization may be sent to the terminal through the intermediate service organization, and the first terminal public key of the terminal may be sent to the third-party service organization, thus a universal security infrastructure and a technical frame work having good openness may be provided by the intermediate service organization.

Description

[0001]This application is a national phase entry under 35 U.S.C. § 371 of International Application No. PCT / CN2019 / 073236, filed on Jan. 25, 2019, which claims priority of Chinese Patent Application No. 201810230134.0, filed with the China National Intellectual Property Administration (CNIPA) on Mar. 20, 2018 and entitled “Method, Terminal and Device for Establishing Secure Infrastructure”, the entire content of which is incorporated herein by reference.FIELD[0002]Embodiments of the invention relate to the field of payment security technology, and in particular to a method, terminal and device for establishing secure infrastructure.BACKGROUND[0003]The mobile USB key is currently the existing payment solution, which is implemented by mainly using SE (Secure Element) combined with TEE (Trusted Execution Environment). The USB key application in the SE realizes the storage of keys and certificates, and the TEE realizes the human-computer interaction such as biometric identification. Tak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/08
CPCH04L9/0825H04L9/085H04L9/0822H04L9/0861H04L9/0894G06Q20/3829G06Q20/02H04L9/0897H04L9/3247H04L9/3231H04L2209/56H04L63/126H04L63/0442H04L67/53
Inventor TIAN, FENGFU, YISHENGJI, NAIGENG
Owner CHINA UNIONPAY